CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

University

30 Qs

quiz-placeholder

Similar activities

Information assurance and security

Information assurance and security

University

25 Qs

Cys quiz 1

Cys quiz 1

University

25 Qs

CCC31 - Chapter 9 - Future Skills and Cyber Security

CCC31 - Chapter 9 - Future Skills and Cyber Security

University

25 Qs

Round 2

Round 2

University

25 Qs

Understanding Software Updates

Understanding Software Updates

10th Grade - University

25 Qs

038_Mobile Device Vulnerabilities – CompTIA Security+ SY0-701

038_Mobile Device Vulnerabilities – CompTIA Security+ SY0-701

9th Grade - University

25 Qs

Match the following

Match the following

University

28 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

Assessment

Quiz

Computers

University

Medium

Created by

Nikki Joi Policar

Used 5+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This consists of the cyber-physical systems that modern societies rely on.

Application Security

Critical Infrastructure Security

Cloud Security

Network Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a practice of protecting systems, networks, and programs from digital attacks.

Cyberguard

Security

Cybersecurity

CyberArchitect

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

S/He works as an advisor and supervisor for all security measures necessary to protect a company or client’s assets effectively.

Security Consultant

Security Architect

CISO

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers usually start by researching and gathering information about the target organization. They look for network ranges, IP addresses, and domain names.

Attack

Expamsion

Obfuscation

Reconnaissance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After getting access to the network, hackers proceed with infiltrating the organization’s network. But to access the network freely, they need access privileges

Reconnaissance

Attack

Expansion

Obfuscation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of malicious software designed to extort money by blocking access to files or the computer system until the ransom is paid.

Ransomware

Malware

Social engineering

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 This layer of cybersecurity ensures that IT teams have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident.

Employee

Processes

Technology

None of the these

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?